Which cyberattack aims to exhaust an application's resources, making the application unavailable to legitimate users?
rainbow table attack
Distributed Denial of Service (DDoS)
dictionary attack
SQL injection